National Repository of Grey Literature 58 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Application of graph databases in cybersecurity
Tichý, Dušan ; Daniel,, Tovarňák (referee) ; Sedlák, Petr (advisor)
This bachelor thesis is aimed at introducing and proposing the use of graph databases in the field of cyber security, specifically in the area of phishing emails.
Proxy servers in Internet
Henek, Jan ; Burda, Karel (referee) ; Komosný, Dan (advisor)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
Internet Criminality
Zelinka, Petr ; Konečný,, Zdeněk (referee) ; Soukup, Tomáš (advisor)
This diploma thesis focuses on the problem of internet crime in the Czech Republic and in the world. It describes and analyses various types of this criminality, used methods and technological equipment. In the second part of diploma thesis there are suggested possible technical and legislative precautions against internet crime.
Internet Criminality
Kosek, Lukáš ; Paclíková, Vlasta (referee) ; Soukup, Tomáš (advisor)
First part of this bachelor thesis deals with computer criminality in Czech Republic, as well as abroad, and focuses on the copyright infringement. It describes different ways through which criminals obtain original works for further illegal usage. Second part of this work offers possible solutions in relation to the results of my survey.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
Email Communication Problematics
Tlusťák, Karel ; Pecho, Peter (referee) ; Malinka, Kamil (advisor)
This work describes actual problems regarding to email communication. It shows how emails technically work and on these bases describes today's possibilities of email authentication. Next to it, the paper focuses on the biggest problems connected to emails - spamming and phishing. As far as spam is concerned, this work is dealing with methods of detection and filtering spam.  Phishing is demonstratively shown on virtual case of phish-attack and attention is paid to anti-phishing tools as well. Other key-part of this work is low view of email problematic. This part covers judgement and eventual punishment of spamming and phishing in accordance to Czech, European Union and other countries' legislation. The phishing, considered to be the most serious problem concerning to emails, is demonstrated by the virtual court case which shows how related organs works and what are the problems about it. Some precedential cases are discussed there as well. The last part of this work describes the implementation of simple program which uses database in the Phishtank server to analyse phishing emails.
??Návrh softwarových nástrojů pro využití v oblasti prevence sociálního inženýrství v prostředí vysoké školy?
Procházka, Tomáš
This bachelor’s thesis focuses on the topic of social engineering within a university environment. Its content includes the selection, implementation, and deployment of a software solution for the purpose of testing selected social engineering techniques in the university environment. The thesis also addresses the evaluation of the test results.
Typology of spam email written in Czech language
Vejda, Prokop ; Mňuková, Dominika (advisor) ; Podzimek, Jan (referee)
The presented thesis proposes a new typology system for Czech-language email spam. Its categorization is based primarily on the persuasive method used. Particular factors relevant for the classification are derived from subsurface observations via the method of semiotic analysis. The multi-layered typology differentiates between spam sales and imitation spam, between identity-imitating and situation-imitating spam. Another layer of categorization identifies the area of incentive for the desired action. The areas are finance, health, sexuality, and consumption. Ideological spam is recognized as a separate category. The typology derives validity from its application to a sample of Czech spam emails originating between January and April 2023. The method used is quantitative content analysis, which allowed the observed characteristics to be presented in a statistical context. Furthermore, it made it possible to elementarily map the nature of spam appearing in the email inboxes of Czech-speaking recipients at the beginning of 2023. The research is based upon a survey of existing typological systems and cases of the application of semiotic analysis to email spam. Theoretical research pillars are the concepts of the social role, speech acts, mythology, and uncertainty of meanings in communication. The...
Criminal and criminological aspects of the phishing
Žilková, Markéta ; Gřivna, Tomáš (advisor) ; Richter, Martin (referee)
Criminal and criminological aspects of the phishing Abstract Present thesis is aimed on analysis of criminal and criminological aspects of phishing. While gathering the literature resources lack of studies systematically describing the problematic of phishing was discovered even though phishing is one of the most common cybernetical crimes and represents a significant thread for users of cyberspace. Czech literature is especially lacking studies concerning criminological aspects of phishing. This thesis is divided to two parts - criminological and criminal. This thesis presents complex description of phishing including its evolution and process of refinement. In the first part phishing as a phenomenon and also its history and types evolving with time are described. The aim of this thesis is to evaluate the trend of number of phishing attacks and to determine whether its increasing, decreasing or level. Given the human interactions in cyberspace increasing trend is expected. In the next part characteristics and motivation of offender, characteristics of the victim and possibilities of prevention are discussed. In this part mostly international sources are being used given the absence of Czech sources. In the criminal part European legislative is briefly mentioned. Nevertheless, this thesis is written in the...
Application for cloning websites for security testing
Kubíčková, Dita ; Sikora, Marek (referee) ; Martinásek, Zdeněk (advisor)
The master thesis is focused on developing application for website cloning that could be used in phishing campaign during security testing. The theoretical part describes social engineering with emphasis on phishing. It also introduces phishing campaigns steps’ and attack framework. Then, it compares currently used tools for website cloning and evaluates their shortcomings. The practical part deals with development of the application in Python using Web Driver and provides the results of application testing in comparison to GoPhish which is often used for website cloning.

National Repository of Grey Literature : 58 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.